22 Commits

Author SHA1 Message Date
Michael Bestas
0e948f4412 Android 14.0.0 Release 50 (AP2A.240605.024)
-----BEGIN PGP SIGNATURE-----
 
 iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZmdzmgAKCRDorT+BmrEO
 eJDEAJ0YGatrj3lBqOKazrdp0XDE1LC14wCaAkRV/x5bLTHYRicXhZkOglIUZRE=
 =2XY/
 -----END PGP SIGNATURE-----
gpgsig -----BEGIN PGP SIGNATURE-----
 
 iQJLBAABCgA1FiEEHrBYPudH862glXQBzJUERRm+ZmkFAmZt6s0XHG1rYmVzdGFz
 QGxpbmVhZ2Vvcy5vcmcACgkQzJUERRm+ZmmePA//ZNBvPbKMhNdrmTca0vk8rcUP
 4VtWs8EKsun2eQglORs9XN99X2JxZTbRlF6e0Cr5U3iTfrYm6ePN67hQ1LSXi4FO
 o64SwpkomX5JERk4d8PvrooawnX0pKWjACHDe8jHMcTDMW2tzwjlNcH7B+suCe9R
 VS65ioTpncMS4wtZq95/Vqt+qziOG/DXYKFWR1FRAV2hztINvaDSsBULSo0TTJkh
 ddYyRD6khQeNEtTsFXkMwqohy+R08JUGJF8s9zhX8yy1s/Dc9rdwDwu2v5/TOnwO
 e4ArmbSlUQuoIXkkZaFdyN7L8r9Vu+ymLyhbj15ijStsV4a+4Rvr/0BQd9EK5HNx
 LFjppnV1ac2uldPwmrsxl0PGgd4hmBPwgwISM25U01eXMXlgieqPXfMh21DZxm3T
 TIBSs/HbayNq9hqsI51BDWeg86hxYl4XlTfr+NEGUlQ8Kd8cgftUsGageakyBJQ2
 GRh1XPzT/NTYQIy+4sugUUVtu0qulx/fd5FkuR4ZcRsFa+SUeOS4VYb7/f3Abug+
 6GPNvQIXlmjXfm5xIKPGzprrD7kZlbKKoVKMaUy/3SXK4v3BPtdR6gZvMnLcRS8i
 EHYqLzkYAcy2eG7S1jekMPxNfXndBsZNZvIWRPZ3PLvw1Kfp0M6wFF/g2p7by/ea
 SAwXetsyQ+XxXmVV/kU=
 =R8pQ
 -----END PGP SIGNATURE-----

Merge tag 'android-14.0.0_r50' into staging/lineage-21_merge-android-14.0.0_r50

Android 14.0.0 Release 50 (AP2A.240605.024)

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZmdzmgAKCRDorT+BmrEO
# eJDEAJ0YGatrj3lBqOKazrdp0XDE1LC14wCaAkRV/x5bLTHYRicXhZkOglIUZRE=
# =2XY/
# -----END PGP SIGNATURE-----
# gpg: Signature made Tue Jun 11 00:43:54 2024 EEST
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2542 signatures in the past
#      2 years.  Encrypted 4 messages in the past 2 years.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg:          It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381  0964 E8AD 3F81 9AB1 0E78

# By Lei Ju (5) and others
# Via Android Build Coastguard Worker (41) and others
* tag 'android-14.0.0_r50': (59 commits)
  [Gyotaku] Update the build rule to exclude build Gyotaku dump for barbet
  Revert "Add betterbug folder to gs-common"
  gps: add policy for partial reset feature
  dumpstate: thermal: update thermal dump script path
  Add betterbug folder to gs-common
  Add PRODUCT_MODULE_BUILD_FROM_SOURCE to fullmte
  Add OWNERS for gs-common/mte.
  Revert "Move sepolicy files from hardware/google/pixel-sepolicy."
  gs-common:thermal: Add thermal owner file
  Move sepolicy files from hardware/google/pixel-sepolicy.
  Allow gnssd set gps property
  gps: Enable Pixel GNSS HAL
  audio: add file_contexts of /dev/acd-mc_headpos
  [Gyotaku] Add the access /data/vendor/gyotaku sepolicy for gyotaku_app domain
  [Gyotaku] Add the dumpLog for gyotaku app
  Give EdgeTpu access to vendor_pcs_app
  Add Gralloc Flags
  Enable MTE workaround for b/324412910
  Set ro.audio.ihaladaptervendorextension_enabled property
  Update policy for ECOService switch to NDK binder
  ...

 Conflicts:
	aoc/aoc.mk
	dauntless/gsc.mk

Change-Id: I38c8a407d90fff523c02a4ebb3b129ed602ebe0c
2024-06-15 22:26:04 +03:00
Michael Bestas
2e79d80e69 Android 14.0.0 release 29
-----BEGIN PGP SIGNATURE-----
 
 iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZeZWyQAKCRDorT+BmrEO
 eEhlAJ9z+0PuxsobmnGcd76nipBxryfkggCfUbqZG8SEc5zTFPwJdlLvVCWj5Ng=
 =4EhT
 -----END PGP SIGNATURE-----
gpgsig -----BEGIN PGP SIGNATURE-----
 
 iQJLBAABCgA1FiEEHrBYPudH862glXQBzJUERRm+ZmkFAmXtRUoXHG1rYmVzdGFz
 QGxpbmVhZ2Vvcy5vcmcACgkQzJUERRm+ZmkrMg/+PZvyDLYO+X/STW0+fMjK4VPl
 AOlHbBo5k3jhUbDiSijw5MqXf/HOpndxk5ckapEs3WgoXsQConKUF5hHrT0fdGgk
 h2YmJEtaRYTpBmfFPtRTAmrQ8ECCnkpq9MEM02C95z1GiiftuwpBeTmI7r9rQADo
 WmRKl9xX5+MMrIfg7TbQv4lqm/g9ygQfPvkpStJdMxs+YcWG74DDP0mqyFOsQqNS
 Qvjsgw6q26vZBtqaIxfS5SP3dfLzNbD8VD68l4gxtOYy0aqbMFy3/a+uGLYAnY9a
 nPTZ6mnvQdB+8dtpN0bJEARiJ6g/4vPVeLdpcz6VT0V9i6gCp6btNAE8l4RlCjws
 gj3btdHfowYa3JIRi057MyEN0OuvCuslspc2C+GYpB5ybLbGqgYL7RFO/Og8gMxo
 tH72u2gbi6V/7ljyxn0K6ZFpb7BU4yya8wtrkNn/ZfEURyeoqSxJCUgUw0Zv11qt
 ln38tHpGFOsVkB9rN30GsnQjUA+AXTKegRfayCW7XjVUL07RkMoWJXqNINjQDS7/
 JxAe8Zv5DfXAkKccK+bRWIrfCfjyFixFHmQfqXakLPvamOrtzuadvgO9HQnkVOXb
 cDXJcpBEj5ca+wxmQ6NaCM0btb3iV1Lf88kYo0wOyGxxbd6FnrAHTVxB1ZuRCxr6
 t/tx6n3o/CJ4ueaGy3Y=
 =URDA
 -----END PGP SIGNATURE-----

Merge tag 'android-14.0.0_r29' into staging/lineage-21_merge-android-14.0.0_r29

Android 14.0.0 release 29

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZeZWyQAKCRDorT+BmrEO
# eEhlAJ9z+0PuxsobmnGcd76nipBxryfkggCfUbqZG8SEc5zTFPwJdlLvVCWj5Ng=
# =4EhT
# -----END PGP SIGNATURE-----
# gpg: Signature made Tue Mar  5 01:18:33 2024 EET
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 2371 signatures in the past
#      2 years.  Encrypted 4 messages in the past 2 years.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg:          It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381  0964 E8AD 3F81 9AB1 0E78

# By Adam Shih (14) and others
# Via Automerger Merge Worker (832) and others
* tag 'android-14.0.0_r29': (122 commits)
  Dumpstate: Remove heap stats
  aoc: add policy to read system property
  dumpstate: add logbuffer support for display
  powerstats: introduce TpuDvfsStateResidencyDataProvider
  [GABC][FATP] Added ProtoCalibGenerator to PRODUCT_PACKAGES_DEBUG
  gs-common: bootctrl: integrate blowAR() for gs101 & zuma
  gs-common: bootctrl: check both properties in setActiveBootSlot
  gs-common: move sepolicy related to bootctrl hal hidl 1.2 to gs-common
  gs-common: create bootctrl_hidl_1.2.mk and include related modules
  gs-common: move bootctrl hal hidl 1.2 implementation to gs-common
  audio: allow hal_audio_default to allocate graphic buffer
  gs-common: move sepolicy related to bootctrl hal aidl to gs-common
  gs-common: create bootctrl_aidl.mk and include related modules
  gs-common: move bootctrl hal aidl implementation to gs-common
  gs-common: add device_google_gs-common_license
  bm: Avoid to use CDT number
  Revert "gs-common: add device_google_gs-common_license"
  Revert "gs-common: move bootctrl hal aidl implementation to gs-c..."
  Revert "gs-common: create bootctrl_aidl.mk and include related m..."
  Revert "gs-common: move sepolicy related to bootctrl hal aidl to..."
  ...

 Conflicts:
	gxp/dump.mk
	soc/soc.mk

Change-Id: Ib2f0bc9419bac6110933855dc90cf2c8a0d5cf15
2024-03-10 07:29:44 +02:00
Tommy Chiu
ddcf9b45e9 Add nugget_aidl_test_weaver to userdebug/eng builds
To minimize the steps required for device preparation.

Fixed: 320200171
Test: build pass
Change-Id: I271389b0c4a7fe453902db2e8971e881c72bca35
2024-02-05 07:56:19 +00:00
Michael Bestas
c2cc4f62f9
Disable userdebug diagnostics
Change-Id: Icbdc3a61ab7b27f2aa0a6a07181b96edd9ee191a
2023-10-19 02:18:37 +03:00
Kevin Zhang
2ec21f2264 allow bindercalls from citadeld to hal_weaver_citadel
For callbacks

Bug: 293355740
Test: Manually reboot citadel, verify callback goes through via logcat

Change-Id: Ic1bb451952170c984ecfad7fbe0fcfdbb2b05c0d
Signed-off-by: Kevin Zhang <zhakevin@google.com>
2023-09-06 22:51:53 +00:00
Bill Richardson
f1fcb6a099 Allow citadeld to set a property on firmware changes
This will allow services which need to be aware of Dauntless
firmware changes to be notified by an init script trigger on
that property.

Bug: 286433589
Test: manual

  Build an image with this change, confirm that `getprop
  vendor.nos.citadel.version` returns the current Dauntless
  firmware version string.

  Update the Dauntless firmware, confirm that the property value
  changes to match.

Change-Id: I45ce87070ce2b6c9fff2c8119db50445b0e576b3
Signed-off-by: Bill Richardson <wfrichar@google.com>
2023-06-08 20:11:39 -05:00
Tommy Chiu
98761efacc vndservicemanager: allow binder_call to hal_keymint_citadel
original log: [    2.048586] type=1400 audit(1683652072.956:4):
avc:  denied  { call } for  comm="vndservicemanag" scontext=u:r:vndservicemanager:s0
      tcontext=u:r:hal_keymint_citadel:s0 tclass=binder permissive=0

Fix: 281814811
Change-Id: I905e2927af1377fed34d6f47254fb68d22fcac77
2023-05-12 04:40:32 +00:00
Joseph Jang
6c4c5cdf26 Move recovery.te to device/google/gs-common/dauntless/sepolicy
Bug: 279381809
Change-Id: I1b5b802bccbcd7e649f58af2c8393ecfca66e6e4
2023-04-24 09:10:10 +00:00
Joseph Jang
852cfb4fb7 Remove the libnos dependency if build without vendor
Bug: 277188968
Change-Id: I4f6aa64d30a58aebb3fca246d0705e7f540bebb8
2023-04-06 11:37:23 +00:00
ChengYou Ho
74dc039db5 Remove weaver/oemlock/authsecret HIDL services
they're replaced by AIDL services

Bug: 176858088
Bug: 182976659
Change-Id: Ibc355cc02182b51e6f68feb251b59c7399aba727
2022-12-20 18:12:37 +00:00
Chengyou Ho
1bfa9e6a2f Merge changes from topic "240932137"
* changes:
  Add oemlock aidl service sepolicy
  gsc.mk: install oemlock aidl service
2022-09-21 13:52:14 +00:00
Chengyou Ho
94f9ddc10e Merge changes from topic "b/246952216"
* changes:
  Add weaver AIDL service sepolicy
  gsc.mk: install weaver AIDL service
2022-09-21 13:51:48 +00:00
Adam Shih
f3105ca062 add missing dumpstate permission
Bug: 247097496
Test: adb bugreport
Change-Id: Icccfe2c4610ae3a9e77d1ad2c17d828e2e860f1b
2022-09-19 10:52:52 +08:00
ChengYou Ho
141c01ba0c Add oemlock aidl service sepolicy
1. avc:  denied  { find } for pid=889 uid=1064 name=android.hardware.citadel.ICitadeld scontext=u:r:hal_oemlock_citadel:s0 tcontext=u:object_r:citadeld_service:s0 tclass=service_manager permissive=1
2. avc: denied { read } for name="vndbinder" dev="binder" ino=6 scontext=u:r:hal_oemlock_citadel:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1
3. avc: denied { write } for name="vndbinder" dev="binder" ino=6 scontext=u:r:hal_oemlock_citadel:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1
4. avc: denied { open } for path="/dev/binderfs/vndbinder" dev="binder" ino=6 scontext=u:r:hal_oemlock_citadel:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1
5. avc: denied { ioctl } for path="/dev/binderfs/vndbinder" dev="binder" ino=6 ioctlcmd=0x6209 scontext=u:r:hal_oemlock_citadel:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1
6. avc: denied { call } for scontext=u:r:hal_oemlock_citadel:s0 tcontext=u:r:vndservicemanager:s0 tclass=binder permissive=1

Bug: 240932137
Change-Id: I804d925e020f6adfe8cd0c34aedead366c99adc0
2022-09-18 20:54:20 +00:00
ChengYou Ho
abfb0bafa5 gsc.mk: install oemlock aidl service
Bug: 240932137
Test: VtsHalOemLockTargetTest
Change-Id: Ib46ddafc41f64858e4db099978b6ba89bfa119b9
2022-09-18 20:54:08 +00:00
ChengYou Ho
f31f736d36 Add weaver AIDL service sepolicy
avc: denied { call } for scontext=u:r:hal_weaver_citadel:s0 tcontext=u:r:citadeld:s0 tclass=binder permissive=1
avc:  denied  { find } for pid=3023 uid=1064 name=android.hardware.citadel.ICitadeld scontext=u:r:hal_weaver_citadel:s0 tcontext=u:object_r:citadeld_service:s0 tclass=service_manager permissive=1
avc: denied { read } for comm="android.hardwar" name="vndbinder" dev="binder" ino=6 scontext=u:r:hal_weaver_citadel:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1
avc: denied { write } for comm="android.hardwar" name="vndbinder" dev="binder" ino=6 scontext=u:r:hal_weaver_citadel:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1
avc: denied { open } for comm="android.hardwar" path="/dev/binderfs/vndbinder" dev="binder" ino=6 scontext=u:r:hal_weaver_citadel:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1
avc: denied { ioctl } for comm="android.hardwar" path="/dev/binderfs/vndbinder" dev="binder" ino=6 ioctlcmd=0x6209 scontext=u:r:hal_weaver_citadel:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1
avc: denied { map } for comm="android.hardwar" path="/dev/binderfs/vndbinder" dev="binder" ino=6 scontext=u:r:hal_weaver_citadel:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1


Bug: 246952216
Change-Id: Id77dc947327a0b9f963fd98bd0143a1b86f646dd
2022-09-18 20:24:10 +00:00
ChengYou Ho
df8d456507 gsc.mk: install weaver AIDL service
Bug: 246952216
Change-Id: I74531b175d3d88c17bf644800951ca4d61d11fd8
2022-09-16 20:35:56 +00:00
ChengYou Ho
182bdd6c08 Add authsecret aidl hal sepolicy
avc: denied { read } for comm="android.hardwar" name="vndbinder" dev="binder" ino=6 scontext=u:r:hal_authsecret_citadel:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1
avc: denied { write } for comm="android.hardwar" name="vndbinder" dev="binder" ino=6 scontext=u:r:hal_authsecret_citadel:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1
avc: denied { open } for comm="android.hardwar" path="/dev/binderfs/vndbinder" dev="binder" ino=6 scontext=u:r:hal_authsecret_citadel:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1
avc: denied { ioctl } for comm="android.hardwar" path="/dev/binderfs/vndbinder" dev="binder" ino=6 ioctlcmd=0x6209 scontext=u:r:hal_authsecret_citadel:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1
 avc: denied { map } for comm="android.hardwar" path="/dev/binderfs/vndbinder" dev="binder" ino=6 scontext=u:r:hal_authsecret_citadel:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1
avc: denied { call } for comm="android.hardwar" scontext=u:r:hal_authsecret_citadel:s0 tcontext=u:r:vndservicemanager:s0 tclass=binder permissive=1
avc: denied { call } for comm="android.hardwar" scontext=u:r:hal_authsecret_citadel:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=1
avc: denied { transfer } for comm="android.hardwar" scontext=u:r:hal_authsecret_citadel:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=1
avc: denied { call } for comm="binder:1286_7" scontext=u:r:system_server:s0 tcontext=u:r:hal_authsecret_citadel:s0 tclass=binder permissive=1
avc: denied { ioctl } for comm="android.hardwar" path="/dev/binderfs/vndbinder" dev="binder" ino=6 ioctlcmd=0x6201 scontext=u:r:hal_authsecret_citadel:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1
avc: denied { call } for comm="android.hardwar" scontext=u:r:hal_authsecret_citadel:s0 tcontext=u:r:citadeld:s0 tclass=binder permissive=1
avc:  denied  { find } for pid=3023 uid=1064 name=android.hardware.citadel.ICitadeld scontext=u:r:hal_authsecret_citadel:s0 tcontext=u:object_r:citadeld_service:s0 tclass=service_manager permissive=0

Bug: 244746589
Change-Id: I8d950329e057a2f806817384e6b00baf6f26efee
2022-09-13 15:52:31 +00:00
ChengYou Ho
9699b144cd Authsecret: install AIDL service
Bug: 244746589
Change-Id: Ie7c57d8a16b1146225d84f510ce7817c4b81e772
2022-09-12 04:07:54 +08:00
Adam Shih
33aa7718bc Move dauntless settings to gs-common
Bug: 242479757
Test: build pass on all Gchip devices
Change-Id: Idfd52a88a420f04169b273a1ef575f10b92874c1
2022-08-31 10:32:55 +08:00
Bob Badour
03c4764838 [LSC] Add LOCAL_LICENSE_KINDS to device/google/gs-common
Added SPDX-license-identifier-Apache-2.0 to:
  dauntless/Android.bp

Bug: 68860345
Bug: 151177513
Bug: 151953481

Test: m all
Change-Id: I6e23c3e322c881318a63134560e41cdebb435056
2022-08-25 11:18:17 -07:00
Adam Shih
d7aa396078 modularize gsc dump
Bug: 242479757
Test: do bugreport that has the same content as before
Change-Id: I4098775fb4b3f40167920354b2c361d801b11594
2022-08-24 02:39:51 +00:00